|
||||||
|
||
|
Home > Information security software |
|
|
261. | Employee Monitoring 3.1 (employeemonitoring.net) | ||
E.M. searches for and alerts prohibited Internet use. It's advanced architecture is designed especially for large companies, universities, libraries and ISPs, yet its methods and feature set are configured for non-technical deployment and utilization. Employee Monitoring overcomes the 5 Main Obstacles of Employee Internet Monitoring (EIM) corporate deployment: 1) High | |||
Updated: 9, 2005 | Rating: 0 | Author: Cameron Shellum | Size: 805 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
262. | Find Protected 2.0 (aks-labs.com) | ||
on local disks and across a network. This product addresses the security problems associated with unauthorized or illegal use of confidential company information. This utility aims to protect your company from electronic data leakage and reveal inappropriate use of sensitive files. With Find | |||
Updated: 9, 2005 | Rating: 0 | Author: AKS-Labs | Size: 1225 kb | Shareware Go to category: Network & Internet > Search/Lookup Tools Similar programs | |||
263. | Eraser 5.3 (tolvanen.com) | ||
is an advanced security tool, which allows you to completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns. You can drag and drop files and folders to the on-demand eraser, use the convenient Explorer shell extension or use the integrated scheduler to program overwriting of unused disk space or, for example, browser | |||
Updated: 9, 2005 | Rating: 0 | Author: Sami Tolvanen | Size: 750 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
264. | EXEsafe 2 (members.aol.com) | ||
It uses the highly secure blowfish encryption algorithm for extra security. The lock is totally customisable - you can lock using a password, timing system, username, or a combination of all three. When the protected program is run, the EXEsafe lock will process all the information, and decide | |||
Updated: 9, 2005 | Rating: 0 | Author: Tobias Constantine-Cort | Size: 960 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
265. | F-Secure Anti-Virus 2004 2004 (f-secure.com) | ||
removes infected attachments automatically. * New! Virus news. Get information about latest threats from F-Secure. Stops even new viruses An average of eight to 10 new viruses are found each day and the rate seems to grow. With its sophisticated virus detection technology combined with a fast | |||
Updated: 9, 2005 | Rating: 34 | Author: F-Secure Corporation | Size: 6866 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
266. | File Monster 2.6.7 (nstarsolutions.com) | ||
completely erases files from your system -- actually overwriting the information in the file so it can not be recovered. The reason information is still available when you delete files with normal deletion methods is because normal deletion methods only tell the operating system to not recognize the file as being present anymore, yet the information hasn't really been | |||
Updated: 9, 2005 | Rating: 0 | Author: Jeff Camino | Size: 432 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
267. | File Shredder 2.0 (mazepath.com) | ||
are gone, but they can be easily recovered, including your financial information and sensitive business documents. Protect yourself with Windows File Shredder. Shredded files cannot be restored by any software. Free to try. Drop entire folders, 7 pass 16k rotating key destruction leaves NOTHING to recover. Windows does not physically remove deleted files from your hard drive. You | |||
Updated: 9, 2005 | Rating: 0 | Author: John Hooper | Size: 277 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
268. | FingerPoint 1.4 (neurotechnologija.com) | ||
etc. Demo version allow enroll only 10 persons. For more information please contact us or review our Web Site. FingerPoint is an end user software package for person identification using his/her fingerprints as a unique | |||
Updated: 9, 2005 | Rating: 16 | Size: 8012 kb | Demo Go to category: System Utilities > Other Similar programs | |||
269. | Folder Password Expert 2.1 (folder-password-expert.com) | ||
Password Expert is a security software program that lets you restrict access to the folders that contain your sensitive data. Secure your documents to prevent people from viewing, printing, or altering them. The folder can be protected simply by right-clicking on it within Windows Explorer. Folder Password Expert will both secure your folders against accidental deletion and prevent | |||
Updated: 9, 2005 | Rating: 0 | Author: Olaf Laturner | Size: 846 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
270. | Folder Protection 2.1 (folder-protection.com) | ||
Protection is security software that lets you control access to your folders. Secure your documents to prevent people from viewing, printing, or altering them. You can protect folders located on your hard drive, as well as on external USB and removable drives. If the drive is connected to another PC, your folders still remain protected. Folder Protection is ideal for notebooks | |||
Updated: 9, 2005 | Rating: 0 | Author: Peter Cadwallen | Size: 786 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
|
Home > Information security software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|